摘要 |
PROBLEM TO BE SOLVED: To make a person other than an authenticated operator impossible to operate an information device that becomes operable by the authentication of the operator, by spoofing the operator. SOLUTION: It is judged whether or not fingerprint data fetched by a fingerprint reader 2 and tag ID data read from an RFID tag by an RFID tag reader 3 are stored in an operator management file 18 while being associated with each other and on a condition where those data are stored, a POS terminal 1 is made operable. At such a time, the tag ID data are stored. The RFID tag reader is periodically operated thereafter. When the stored ID tag data are not read any more, the POS terminal 1 is made non-operable. COPYRIGHT: (C)2007,JPO&INPIT |